Author of the publication

Attacks and design of image recognition CAPTCHAs.

, , , , , , , and . ACM Conference on Computer and Communications Security, page 187-200. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization for the directional filter bank of the nonsubsampled contourlet transform., , and . ICNC, page 4135-4138. IEEE, (2010)DCSACA: distributed constraint service-aware collaborative access algorithm based on large-scale access to the Internet of Things., and . J. Supercomput., 74 (12): 6408-6427 (2018)An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things., , and . Sensors, 16 (11): 1846 (2016)Navigation toward Non-static Target Object Using Footprint Detection Based Tracking., , , , , , and . ACCV (3), volume 7726 of Lecture Notes in Computer Science, page 389-400. Springer, (2012)Image Retrieval Method Based on IPDSH and SRIP., , , , and . TIIS, 8 (5): 1676-1689 (2014)Aerial Video Images Registration Based on Optimal Derivative Filters with Scene-Adaptive Corners., , and . ICIG, page 993-997. IEEE Computer Society, (2011)Research on Online Reservation Preference of Hotel Consumers Based on Joint Analysis Method., and . IJEIS, 15 (4): 75-86 (2019)Precision Mosaicking of Multi-images Based on Conic-Epipolar Constraint., , and . ECC (2), volume 298 of Advances in Intelligent Systems and Computing, page 555-563. Springer, (2014)DPA: 一种动态环境下QoS单播路由算法 (DPA: A QoS Unicast Routing Algorithm in Dynamic Environment)., , , and . 计算机科学, 42 (1): 126-128 (2015)The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network., , , and . Wirel. Commun. Mob. Comput., (2020)